Cargando…

Characterization of the Ability of Low-Cost GNSS Receiver to Detect Spoofing Using Clock Bias

The aim of this paper was to propose a method to characterize the ability of a GNSS user to detect a spoofing attack from the behavior of the clock bias. Spoofing interference is not a new issue, especially in military GNSS, although it is a new challenge for civil GNSS, since it is currently implem...

Descripción completa

Detalles Bibliográficos
Autores principales: Truong, Victor, Vervisch-Picois, Alexandre, Rubio Hernan, Jose, Samama, Nel
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10007427/
https://www.ncbi.nlm.nih.gov/pubmed/36904938
http://dx.doi.org/10.3390/s23052735
_version_ 1784905518556381184
author Truong, Victor
Vervisch-Picois, Alexandre
Rubio Hernan, Jose
Samama, Nel
author_facet Truong, Victor
Vervisch-Picois, Alexandre
Rubio Hernan, Jose
Samama, Nel
author_sort Truong, Victor
collection PubMed
description The aim of this paper was to propose a method to characterize the ability of a GNSS user to detect a spoofing attack from the behavior of the clock bias. Spoofing interference is not a new issue, especially in military GNSS, although it is a new challenge for civil GNSS, since it is currently implemented and used in many everyday applications. For this reason, it is still a topical issue, especially for receivers that only have access to high-level data (PVT,CN0). To address this important issue, after conducting a study of the receiver clock polarization calculation process, this led to the development of a very basic Matlab model that emulates a spoofing attack at the computational level. Using this model, we were able to observe that the clock bias is affected by the attack. However, the amplitude of this disturbance depends on two factors: the distance between the spoofer and the target and the synchronization between the clock that generates the spoofing signal and the reference clock of the constellation. To validate this observation, more or less synchronized spoofing attacks were carried out on a fixed commercial GNSS receiver with the use of GNSS signal simulators and also with a moving target. We propose then a method to characterize the capacity of detecting a spoofing attack with the clock bias behavior. We present the application of this method for two commercial receivers of the same manufacturer from different generations.
format Online
Article
Text
id pubmed-10007427
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-100074272023-03-12 Characterization of the Ability of Low-Cost GNSS Receiver to Detect Spoofing Using Clock Bias Truong, Victor Vervisch-Picois, Alexandre Rubio Hernan, Jose Samama, Nel Sensors (Basel) Article The aim of this paper was to propose a method to characterize the ability of a GNSS user to detect a spoofing attack from the behavior of the clock bias. Spoofing interference is not a new issue, especially in military GNSS, although it is a new challenge for civil GNSS, since it is currently implemented and used in many everyday applications. For this reason, it is still a topical issue, especially for receivers that only have access to high-level data (PVT,CN0). To address this important issue, after conducting a study of the receiver clock polarization calculation process, this led to the development of a very basic Matlab model that emulates a spoofing attack at the computational level. Using this model, we were able to observe that the clock bias is affected by the attack. However, the amplitude of this disturbance depends on two factors: the distance between the spoofer and the target and the synchronization between the clock that generates the spoofing signal and the reference clock of the constellation. To validate this observation, more or less synchronized spoofing attacks were carried out on a fixed commercial GNSS receiver with the use of GNSS signal simulators and also with a moving target. We propose then a method to characterize the capacity of detecting a spoofing attack with the clock bias behavior. We present the application of this method for two commercial receivers of the same manufacturer from different generations. MDPI 2023-03-02 /pmc/articles/PMC10007427/ /pubmed/36904938 http://dx.doi.org/10.3390/s23052735 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Truong, Victor
Vervisch-Picois, Alexandre
Rubio Hernan, Jose
Samama, Nel
Characterization of the Ability of Low-Cost GNSS Receiver to Detect Spoofing Using Clock Bias
title Characterization of the Ability of Low-Cost GNSS Receiver to Detect Spoofing Using Clock Bias
title_full Characterization of the Ability of Low-Cost GNSS Receiver to Detect Spoofing Using Clock Bias
title_fullStr Characterization of the Ability of Low-Cost GNSS Receiver to Detect Spoofing Using Clock Bias
title_full_unstemmed Characterization of the Ability of Low-Cost GNSS Receiver to Detect Spoofing Using Clock Bias
title_short Characterization of the Ability of Low-Cost GNSS Receiver to Detect Spoofing Using Clock Bias
title_sort characterization of the ability of low-cost gnss receiver to detect spoofing using clock bias
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10007427/
https://www.ncbi.nlm.nih.gov/pubmed/36904938
http://dx.doi.org/10.3390/s23052735
work_keys_str_mv AT truongvictor characterizationoftheabilityoflowcostgnssreceivertodetectspoofingusingclockbias
AT vervischpicoisalexandre characterizationoftheabilityoflowcostgnssreceivertodetectspoofingusingclockbias
AT rubiohernanjose characterizationoftheabilityoflowcostgnssreceivertodetectspoofingusingclockbias
AT samamanel characterizationoftheabilityoflowcostgnssreceivertodetectspoofingusingclockbias